GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL


Reply
 
LinkBack Thread Tools Display Modes
Old 12-18-2020, 08:03   #751 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 39
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 448
Lava iris 65 FRP Removed Successfully by Hydra Dongle


Lava iris 65 FRP Removed Successfully by Hydra Dongle

Lava iris 65 MT6739 Android 8 Reset FRP with Hydra Tool



Quote:
Brand : LAVA Model : Iris 65 Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...
-PreLoader...[COM70]

TPortConnection.Create...(COM70)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0699 (0000)MT6739[6739]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : 00
BR Secured : 00
NORMAL BOOT

Preparing Download Agent..
DA : 6739_LAVA.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2017-12-06.16:47_396299
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : preloader

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 86B8E516C3736E2D7D9FF5227155C57A
ERAM Size : 0x0000000000020000 -128 KB
IRAM Size : 0x0000000040000000 -1024 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000080000 -512 KB
eMMC USER : 0x00000001D2000000 -7.281 GB
eMMC CID : 150100464E36324D4203768B90EE5543 - FN62MB

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : LAVA
Vendor : LAVA
Model : iris65
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : full_lava6739_sp65-user 8.1.0 O11019 1587736597 release-keys
Device : iris65
Display ID : LAVA_iris65_1_8_S142_INT_20D27
Security Patch : 2020-04-05
Fingerprint : LAVA/iris65/iris65:8.1.0/O11019/1587736597:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_lava6739_sp65.bin
Creating Scatter file... C:\Program Files\HydraTool\\Backup\Auto\LAVA_iris65_0699--8.1.0_LAVA_iris65_1_8_S142_INT_20D27_141220090731\ MT6739_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x02D88000]1024 KB ->frp.bin...Ok
-nvdata[0x03688000]32 MB ->nvdata.bin...Ok
-persist[0x09000000]48 MB ->persist.bin...Ok
-nvram[0x13700000]5 MB ->nvram.bin...Ok
Done!!!
C:\Program Files\HydraTool\\Backup\Auto\LAVA_iris65_0699--8.1.0_LAVA_iris65_1_8_S142_INT_20D27_141220090731
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 86B8E516C3736E2D7D9FF5227155C57A
ERAM Size : 0x0000000000020000 -128 KB
IRAM Size : 0x0000000040000000 -1024 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000080000 -512 KB
eMMC USER : 0x00000001D2000000 -7.281 GB
eMMC CID : 150100464E36324D4203768B90EE5543 - FN62MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : LAVA
Vendor : LAVA
Model : iris65
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : full_lava6739_sp65-user 8.1.0 O11019 1587736597 release-keys
Device : iris65
Display ID : LAVA_iris65_1_8_S142_INT_20D27
Security Patch : 2020-04-05
Fingerprint : LAVA/iris65/iris65:8.1.0/O11019/1587736597:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:21
  Reply With Quote
The Following User Says Thank You to ceza031 For This Useful Post:
Old 12-18-2020, 08:05   #752 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Huawei DUB-LX1 (Y7 2019) Formatting user data Successfully Done by Hydra Tool

Huawei DUB-LX1 (Y7 2019) Formatting user data Successfully Done by Hydra Tool


Screen Short :





Logs:


Quote:
PreOperation Configuration
Brand : HUAWEI Model : DUB-LX1 (Y7 2019) Storage : Auto
Loader: DUB-LX1_Loader_T-Tool-Team_1.mbn
Port : Auto
Connection : Flash Mode

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM50)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&6e6a8ed&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/04/2013,2.1.0.5

Getting device info......
Serial No.: 0x07C7B3ED
MSM ID : 0x0009A0E1, SDM450-Qualcomm Snapdragon 450
PBL Ver : 00000000
PK HASH : 6BC369511DA9CADB3A7AF61574F89DB3
85003D6241BDD1FF573DBA61BF6AE119

Firehose Loader[DUB-LX1_Loader_T-Tool-Team_1.mbn]
SaharaBoot... Ok
Sending .............Ok
Connecting to Firehose...
Ping... Ok
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 1030118733
Firmware Version : 0
Product Name : hB8aP>
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Vendor : unknown
ID : OPM1.171019.011
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : generic_a53-user 8.1.0 OPM1.171019.011 eng.jslave.20190717.020312 test-keys
Display ID : System 8.2.0.036(05T4)
Security Patch : 2019-06-01

Reading GPT[3]
Drive [0] 56 Items
Drive [1] 0 Items
Drive [2] 0 Items

Formatting Userdata...
Method : Zero Wipe
Processing...
- Formatting Userdata [Zero Wipe] OkOk

Elapsed Time : 00:00:04
BR
Dipendra Pathak
  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 12-18-2020, 08:14   #753 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Oppo F7 (CPH 1918) Removing FRP partition (data) successfully removed by Hydra Tool

Oppo F7 (CPH 1918) Removing FRP partition (data) successfully removed by Hydra Tool



Screen Short:






Logs:

Quote:
Brand : OPPO Model : F7 (CPH1819) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...[COM141]

TPortConnection.Create...(COM141)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0788 (0000)MT6771[6771]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E5[SBC+SDA+SEL]

Security Authorization....
Sending[Oppo_F7.auth] Accepted

Preparing Download Agent..
DA : 6771_SWSEC_E0871E87F0.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.00.00
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_oppo6771_17197.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : C83CACBACE59278EA12323DDF3638433
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A484347386134A50A13D8332519 - HCG8a4

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6771-user 10 QP1A.190711.020 7604ad4e2b1328a1 release-keys
Display ID : QP1A.190711.020 release-keys
Security Patch : 2020-08-05
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_oppo6771.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\__0788--10_QP1A.190711.020 release-keys_171220181706\MT6771_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x07C88000]1024 KB ->frp.bin...Ok
-nvdata[0x09D88000]64 MB ->nvdata.bin...Ok
-persist[0x11800000]48 MB ->persist.bin...Ok
-nvram[0x20D00000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\__0788--10_QP1A.190711.020 release-keys_171220181706
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : C83CACBACE59278EA12323DDF3638433
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A484347386134A50A13D8332519 - HCG8a4

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6771-user 10 QP1A.190711.020 7604ad4e2b1328a1 release-keys
Display ID : QP1A.190711.020 release-keys
Security Patch : 2020-08-05
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition...[C002002A-STATUS_SEC_IMG_TYPE_MISMATCH]
Erasing FRP Partition...
Formatting Userdata... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:51

BR
Dipendra Pathak
  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 12-18-2020, 08:22   #754 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi Note 7 Pro mi-account successfully removed by Hydra King Tool

Xiaomi Redmi Note 7 Pro mi-account successfully removed by Hydra King Tool


Screen Short :







Logs:

Quote:
PreOperation Configuration
Brand : AUTO Model : AUTO Storage : Auto
Loader: Auto
Port : Auto
Connection : Flash Mode

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM9)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&2ddeac5e&0&6#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/17/2014,10.2104.1.2

Getting device info......
Serial No.: 0x68938A8E
MSM ID : 0x000950E1, SM6150-Qualcomm Snapdragon 675
PBL Ver : 00000000
PK HASH : 1BEBE3863A6781DB4B01086063007334
DE9E5CA14971C7C4F4358EC9D79CDA46

Firehose Loader[prog_emmc_firehose_Sm6150_ddr.elf]
SaharaBoot... Ok
Sending ...................................Ok
Connecting to Firehose...
Ping..................... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[eVNSAXJh4nRC0N-yOPswVTU5xIT]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 19 2019 - 01:12:10

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 1795058388
Firmware Version : 2
Product Name : 3V6CMB
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 244277248[116,48 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]

Protocol : Universal
Running : Ok
Reading GPT[4]
Drive [0] 88 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]


Phone Information......
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 7 Pro
ID : PKQ1.181203.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Description : violet-user 9 PKQ1.181203.001 9.5.16 release-keys
Miui Ver : V10
Device : violet
Display ID : PKQ1.181203.001
Security Patch : 2019-05-01
Fingerprint : xiaomi/violet/violet:9/PKQ1.181203.001/9.5.16:user/release-keys

Processing Remove MiAccount[Patch Method]....
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 7
Successfully patched address..
Action Result : Ok

Elapsed Time : 00:00:18
BR
Dipendra Pathak

  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 12-18-2020, 08:34   #755 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Oppo A37f (msm 8916) FRP successfully Reset by King Hydra Tool

Oppo A37f (msm 8916) FRP successfully Reset by King Hydra Tool



Screen Short :







Logs:


Quote:
PreOperation Configuration
Brand : OPPO Model : A37 Storage : Auto
Loader: 8916.mbn
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM55]
TPortConnection.Create...(COM55)..Opening...Ok
Getting device info..
Device MODE : SAHARA

Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8916
Version : 1

Running : Ok

Reading GPT[3], Partitions(44 Items) Ok
Phone Information.....
Model : A37f
Brand : OPPO
Android Ver : 5.1.1
Manufacturer : OPPO
Device :
Board : msm8916
Display ID : A37fEX_11_170506
Security Patch : 2017-03-01
Platform : msm8916
Kernel ID : 2017-03-01
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint :
ro_product_hardware :
sys_hardware_version :

Reading GPT[3], Partitions(44 Items) Ok
*** FRP Reset ***
Resetting FRP...
Auto
Processing...
Executing ...
[Zero Wipe] Ok

Elapsed Time : 00:00:05


TPortConnection.Destroy.....Closing...Ok..

BR
Dipendra Pathak
  Reply With Quote
The Following 2 Users Say Thank You to Dipendra Pathak For This Useful Post:
Old 12-18-2020, 08:59   #756 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiomi Redmi Go Android 8.1.0 FRP successfully Removed by Hydra Tool

Xiomi Redmi Go Android 8.1.0 FRP successfully Removed by Hydra Tool


Screen Short:






Logs:


Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi Go (tiare) Storage : Auto
Loader: Redmi_8917.mbn
Port : Auto
Connection : Flash Mode

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM11)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&aea7634&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/25/2016,2.1.2.2

Getting device info......
Serial No.: 0xFEDAB0FD
MSM ID : 0x000560E1, MSM8917-Qualcomm Snapdragon 425
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Redmi_8917.mbn]
SaharaBoot... Ok
Sending ...................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 296013416
Firmware Version : 3
Product Name : FN62MB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 15269888[7,281 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi Go
ID : OPM1.171019.026
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : tiare-user 8.1.0 OPM1.171019.026 V10.2.20.0.OCLMIXM release-keys
Device : tiare
Mod_device : tiare_global
Display ID : OPM1.171019.026.V10.2.20.0.OCLMIXM
Security Patch : 2020-09-05
Emmc_size : 16GB
Fingerprint : Xiaomi/tiare/tiare:8.1.0/OPM1.171019.026/V10.2.20.0.OCLMIXM:user/release-keys

Reading GPT[3]
Drive [0] 48 Items
Drive [1] 0 Items
Drive [2] 0 Items

*** FRP Reset ***
Resetting FRP...
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOkOk

Elapsed Time : 00:00:04
BR
Dipendra Pathak
  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 12-19-2020, 07:52   #757 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Huawei HOL-U19 (Honor Holly) Screen Lock Security successfully removed by Hydra Tool

Huawei HOL-U19 (Honor Holly) Screen Lock Security successfully removed by Hydra Tool


Screen Short:



Logs:


Quote:
Brand : HUAWEI Model : HOL-U19 (Honor Holly) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...
-PreLoader...[COM47]

TPortConnection.Create...(COM47)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 6582 (0000)MT6582[6582]
BROM HW_SW_VER : 8A00 CA01 0001 0000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : 00
BR Secured : 00
NORMAL BOOT

Preparing Download Agent..
DA : [Not Exist]
Trying Default 6582.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018-09-18.13:22_452898
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : Old - eMMC
00000000000000000000
PRMMCCID : 1501004B3858564D420611D6CE9A1257
Init Configuration
Running DA 4.2 on BBID : 0x87 Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
ERAM Size : 0x0000000040000000 -1024 MB
IRAM Size : 0x0000000000020000 -128 KB
UNICAL RID : 07B055C4457AACA6F5761ABAD17BEE29
eMMC CID : 4B0001154D565838D611064257129ACE
Change to HIGH SPEED...
5A
Connection
-Please wait...
-Found...[COM48]


Reading Partition Table
SIZE[0x00000720] 19 Items > Done

Reading System Info
Brand : HUAWEI
Vendor : HUAWEI
Model : Hol-U19
ID : HUAWEIHol-U19
SDK : 19
Release : 4.4.2
ABI : armeabi-v7a
Description : huaqin82_wet_b2b_kk-user HUAWEIHol-U19 C328B107 release-keys
Device : HWHol-U
Board : Hol-U19
Display ID : Holly-U19V100R001C328B106
Fingerprint : HUAWEI/Hol-U19/HWHol-U:4.4.2/HUAWEIHol-U19/C328B107:user/release-keys
StorageType : mtp,mass_storage
Userdata State : Not Encrypted

Autobackup Partitions
-PRELOADER[0x00000000] 512 KB -> PRELOADER.bin...Ok
-> Renaming Preloader.... preloader_huaqin82_wet_b2b_kk.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\HUAWEI_Hol-U19_6582--4.4.2_Holly-U19V100R001C328B106_181220160328\MT6582_Android_sc atter.txt
-NVRAM[0x01000000] 5 MB -> NVRAM.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\HUAWEI_Hol-U19_6582--4.4.2_Holly-U19V100R001C328B106_181220160328
MTK Phone Loader is NOW RUNNING.


Reading System Info
Brand : HUAWEI
Vendor : HUAWEI
Model : Hol-U19
ID : HUAWEIHol-U19
SDK : 19
Release : 4.4.2
ABI : armeabi-v7a
Description : huaqin82_wet_b2b_kk-user HUAWEIHol-U19 C328B107 release-keys
Device : HWHol-U
Board : Hol-U19
Display ID : Holly-U19V100R001C328B106
Fingerprint : HUAWEI/Hol-U19/HWHol-U:4.4.2/HUAWEIHol-U19/C328B107:user/release-keys
StorageType : mtp,mass_storage
Userdata State : Not Encrypted

-------------------------------------
Operation : Remove Lock Without Data Loss
Processing...
Searching patching address.. [Ok].. [Ok].. [Ok].. [Ok] Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:20
BR
Dipendra Pathak
  Reply With Quote
Old 12-19-2020, 08:02   #758 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Cherry Mobile Touch XL 2 FRP successfully removed by Hydra Tool

Cherry Mobile Touch XL 2 FRP successfully removed by Hydra Tool




Screen Short :







Logs:


Quote:
Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
Connection
-Please wait...
-Found...
-PreLoader...[COM12]

TPortConnection.Create...(COM12)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 6580 (0000)MT6580[6580]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
FUSEID : 00000000
SECURE VERSION : FF
BL VERSION : 01
BR Secured : 00

Preparing Download Agent..
DA : 6580.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018-09-18.13:22_452898
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : Old - eMMC
0000000000000000000000000000
PRMMCCID : 90014A48384731650507570165B9335B
Init Configuration
Running DA 4.2 on BBID : 0x9C Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000001D2000000 -7.281 GB
ERAM Size : 0x0000000040000000 -1024 MB
IRAM Size : 0x0000000000020000 -128 KB
UNICAL RID : 881F0882939B36F61B3B0B52A9C21FAC
eMMC CID : 484A019065314738015707055B33B965
Change to HIGH SPEED...
5A
Connection
-Please wait...
-Found...[COM13]


Reading Partition Table
SIZE[0x00000738] 21 Items > Done

Reading System Info
Brand : CHERRY
Vendor : CHERRY
Model : Touch XL 2
ID : Touch XL 2
SDK : 23
Release : 6.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : full_vsun6580_we_m-user 6.0 MRA58K 1470878893 test-keys
Device : Touch_XL_2
Board : CHERRY
Display ID : TouchXL2_V2.0_20160810
Security Patch : 2016-02-01
Platform : mt6580
FRPPST : /dev/block/platform/mtk-msdc.0/11120000.msdc0/by-name/frp
Fingerprint : CHERRY/Touch_XL_2/H800:6.0/MRA58K/TouchXL2_V2.0_20160810:user/test-keys
StorageType : mtp,mass_storage
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000] 512 KB -> preloader.bin...Ok
-> Renaming Preloader.... preloader_vsun6580_we_m.bin
Creating Scatter file... F:\Installer\HYDRA\HydraTool_Fullpackage_9-22-2020\\Backup\Auto\CHERRY_Touch XL 2_6580-mt6580-6.0_TouchXL2_V2.0_20160810_181220163115\MT6580_And roid_scatter.txt
-nvram[0x00380000] 5 MB -> nvram.bin...Ok
-frp[0x04FA0000] 1024 KB -> frp.bin...Ok
-nvdata[0x050A0000] 32 MB -> nvdata.bin...Ok
Done!!!
F:\Installer\HYDRA\HydraTool_Fullpackage_9-22-2020\\Backup\Auto\CHERRY_Touch XL 2_6580-mt6580-6.0_TouchXL2_V2.0_20160810_181220163115
MTK Phone Loader is NOW RUNNING.


Reading System Info
Brand : CHERRY
Vendor : CHERRY
Model : Touch XL 2
ID : Touch XL 2
SDK : 23
Release : 6.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : full_vsun6580_we_m-user 6.0 MRA58K 1470878893 test-keys
Device : Touch_XL_2
Board : CHERRY
Display ID : TouchXL2_V2.0_20160810
Security Patch : 2016-02-01
Platform : mt6580
FRPPST : /dev/block/platform/mtk-msdc.0/11120000.msdc0/by-name/frp
Fingerprint : CHERRY/Touch_XL_2/H800:6.0/MRA58K/TouchXL2_V2.0_20160810:user/test-keys
StorageType : mtp,mass_storage
Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok]
Formatting Userdata... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:24
BR
Dipendra Pathak

  Reply With Quote
Old 12-19-2020, 08:10   #759 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Redmi Note 6 Pro (tulip) mi-account removed successfully by HYDRA KING

Redmi Note 6 Pro (tulip) mi-account removed successfully by HYDRA KING


Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi Note 6 Pro (tulip) Storage : Auto
Loader: mi_2_9.elf
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM6]
TPortConnection.Create...(COM6)..Opening...Ok
Getting device info.......
Serial No.: 0xC1DC5CDA
MSM ID : 0x000CC0E1,
PBL Ver : 00000004
PK HASH : A7B8B82545A98ECA23D6E9105FB46456
8D1B5828264903441BDEF0CD57E3C370

Firehose Loader[mi_2_9.elf]
SaharaBoot... Ok
Sending ...............................Ok
Connecting to Firehose...
Ping...... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 8192
MaxPayloadSizeToTargetInBytesSupported : 8192
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Aug 2 2018 - 22:27:53

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 112810415
Firmware Version : 5644752166968636211
Product Name : S0J97Y
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[4], Partitions(64 Items) Ok
Phone Information.....
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 6 Pro
ID : PKQ1.180904.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : tulip-user 9 PKQ1.180904.001 V11.0.5.0.PEKMIXM release-keys
Miui Ver : V11
Device : tulip
Mod_device : tulip_global
Display ID : PKQ1.180904.001
Security Patch : 2020-07-05
Fingerprint : xiaomi/tulip/tulip:9/PKQ1.180904.001/V11.0.5.0.PEKMIXM:user/release-keys

Reading GPT[4], Partitions(64 Items) Ok
Operation : MiAccount
Remove MiAccount[Erase Method]
Processing...
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 13
Successfully patched address..Ok
Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:08:58
BR
Dipenda Pathak
  Reply With Quote
Old 12-19-2020, 08:19   #760 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Oppo A37m (Neo 9) MTK 6750 Successfully flashed by Hydra Tool

Oppo A37m (Neo 9) MTK 6750 Successfully flashed by Hydra Tool


Screen Short:




Logs:


Quote:
Brand : OPPO Model : A37m (Neo 9) Connection : Flash Mode

=====================================
How To Boot : Power off phone
* BROM Mode : Press VOL +
* Preloader Mode : Just Insert cable

Connection
-Please wait...
-Connect Phone...
-Found...[COM58]

TPortConnection.Create...(COM58)..Opening...Ok


Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0326 (0000)MT6750T[6755]
BROM HW_SW_VER : 8A00 CB00 0001 0000
FUSEID : 00000442
SECURE VERSION : 05
BL VERSION : FE
BR Secured : 00
NORMAL BOOT

Preparing Download Agent..
DA : 6755_SWSEC_2B23567CB4.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.00.00
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_oppo6750_15127.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 469DA9B793DEF852075D15A5837D45A1
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB400000 -14.676 GB
eMMC CID : 13014E51324A3936521000CD5A1A533F - Q2J96R

DA Speed : full-speed
DA Speed : full-speed
Change to HIGH SPEED...
Connection
-Please wait...
-Found...[COM59]


Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : OPPO
Vendor : OPPO
Model : OPPO A37m
ID : LMY47I
SDK : 22
Release : 5.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : full_oppo6750_15127-user 5.1 LMY47I 1472667727 dev-keys
Device : A37
Board : full_oppo6750_15127
Display ID : A37m_11_A.12_160901
Security Patch : 2016-05-01
Platform : mt6750
FRPPST : /dev/block/platform/mtk-msdc.0/by-name/frp
Fingerprint : OPPO/A37m/A37:5.1/LMY47I/1449641681:user/release-keys
StorageType : mtp,mass_storage
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_oppo6750_15127.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\OPPO_OPPO A37m_0326-mt6750-5.1_A37m_11_A.12_160901_181220160323\MT6750T_Andro id_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x03F88000]1024 KB ->frp.bin...Ok
-nvdata[0x04088000]32 MB ->nvdata.bin...Ok
-nvram[0x0CF00000]5 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\OPPO_OPPO A37m_0326-mt6750-5.1_A37m_11_A.12_160901_181220160323
MTK Phone Loader is NOW RUNNING.

Reading GPT-EMMC [0x00008000] 130 Items

Flashing Selected Partitions....
- preloader[preloader_oppo6750_15127.bin] 256 KB Skipped
- recovery[recovery.img] 16 MB Flash -> = Ok
- md1img[md1rom.img] 24 MB Flash -> = Ok
- md1dsp[md1dsp.img] 4 MB Flash -> = Ok
- md1arm7[md1arm7.img] 3 MB Flash -> = Ok
- md3img[md3rom.img] 5 MB Flash -> = Ok
- lk[lk.bin] 1024 KB Flash -> = Ok
- lk2[lk.bin] 1024 KB Flash -> = Ok
- boot[boot.img] 16 MB Flash -> = Ok
- logo[logo.bin] 8 MB Flash -> = Ok
- tee1[trustzone.bin] 5 MB Flash -> = Ok
- tee2[trustzone.bin] 5 MB Flash -> = Ok
- secro[secro.img] 6 MB Flash -> = Ok
- system[system.img] 2 GB Flash -> = Ok
- cache[cache.img] 256 MB Flash -> = Ok
- userdata[userdata.img] 4 GB Flash -> = Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..
=====================================

Elapsed Time : 00:03:44
BR
Dipendra Pathak
  Reply With Quote
Old 12-19-2020, 08:38   #761 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Nokia TA-1029 (Nokia 2) successfully flashed by Hydra Tool

Nokia TA-1029 (Nokia 2) successfully flashed by Hydra Tool



Screen Short:





Logs:


Quote:
Searching EDL Port..[COM7]
TPortConnection.Create...(COM7)..Opening...Ok
Getting device info.......
Serial No.: 0x10655287
MSM ID : 0x009600E1, MSM8909-Qualcomm Snapdragon 210
PBL Ver : 00000000
PK HASH : F5F4192A33B2830974B400119BAB728C
C9FE911011F928625C2AED0DA441AC97

Firehose Loader[NK_0_1.mbn]
SaharaBoot... Ok
Sending ..............Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8909
Version : 1


Protocol : Universal
Running : Ok

Reading GPT[3], Partitions(128 Items) Ok
Phone Information.
ERROR reading system image [corrupted/erased]
Reading GPT[3], Partitions(128 Items) Ok

Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
D:\Tool\Hydra Tool\Backup\Security_Backup\___Security_1218201045 36.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- gpt_main0(0)[gpt_main0.bin] Ok
- sbl1(0)[sbl1.mbn] Ok
- sbl1bak(0)[sbl1.mbn] Ok
- aboot(0)[emmc_appsboot.mbn] Ok
- abootbak(0)[emmc_appsboot.mbn] Ok
- rpm(0)[rpm.mbn] Ok
- rpmbak(0)[rpm.mbn] Ok
- tz(0)[tz.mbn] Ok
- tzbak(0)[tz.mbn] Ok
- systeminfo(0)[sysinfo.cfg] Ok
- splash(0)[splash.img] Ok
- ftm(0)[ftm.img] Ok
- hidden(0)[hidden.img] Ok
- cda(0)[cda.img] Ok
- elabel(0)[elabel] Ok
- recovery(0)[recovery.img] Ok
- sec(0)[sec.dat] Ok
- boot(0)[boot.img] Ok
- modem(0)[NON-HLOS.bin] Ok
- system(0)[system.img] Ok
- misc(0)[misc.img] Ok
- cache(0)[cache.img] Ok
- persist(0)[persist.img] Ok
- keystore(0)[keystore.bin] Ok
- cmnlib(0)[cmnlib.mbn] Ok
- cmnlibbak(0)[cmnlib.mbn] Ok
- keymaster(0)[keymaster.mbn] Ok
- keymasterbak(0)[keymaster.mbn] Ok
- userdata(0)[userdata.img] Ok
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok
Rebooting Phone.... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:07:36


BR
Dipendra Pathak
  Reply With Quote
The Following 2 Users Say Thank You to Dipendra Pathak For This Useful Post:
Old 12-19-2020, 08:48   #762 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Asus X00ID (ZenFone 4 Max ZC554KL) FRP successfully removed by Hydra Tool

Asus X00ID (ZenFone 4 Max ZC554KL) FRP successfully removed by Hydra Tool

Screen Short:




Logs:


Quote:
PreOperation Configuration
Brand : ASUS Model : X00ID (ZenFone 4 Max ZC554KL) Storage : Auto
Loader: asus_2_5.mbn
Port : Auto
Connection : Flash Mode

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM76)
SymbolicName :\??\USB#VID_05C6&PID_9008#7&32b1a246&0&4#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0xDDA7EB09
MSM ID : 0x0004F0E1, MSM8937-Qualcomm Snapdragon 430
PBL Ver : 00000000
PK HASH : 49D087CA08C6E2CA3D209C5697971E85
D42A2F632592E68230C7D780F7D5DC1F

Firehose Loader[asus_2_5.mbn]
SaharaBoot... Ok
Sending ....................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 1956293156
Firmware Version : 7
Product Name : RX1BMB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29,121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Brand : asus
Vendor : asus
Model : ASUS_X00ID
ID : NMF26F
SDK : 25
Release : 7.1.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_64-user 7.1.1 NMF26F 14.2016.1803.232-20180301 release-keys
Device : ASUS_X00ID
Board : ASUS_X00ID
Display ID : NMF26F.WW_Phone-14.2016.1803.232-20180301
Security Patch : 2018-03-01
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : asus/WW_Phone/ASUS_X00ID:7.1.1/NMF26F/14.2016.1803.232-20180301:user/release-keys

Reading GPT[3]
Drive [0] 56 Items
Drive [1] 0 Items
Drive [2] 0 Items

*** FRP Reset ***
Resetting FRP...
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOkOk

Elapsed Time : 00:00:03
BR
Dipendra Pathak
  Reply With Quote
Old 12-19-2020, 09:07   #763 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiami Redmi Note 4X (MIDO) FRP removed successfully by HYDRA KING TOOL

Xiami Redmi Note 4X (MIDO) FRP removed successfully by HYDRA KING TOOL



Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi Note 4X (Mido) Storage : Auto
Loader: Xiaomi_S2y2_noauth_8953_ddr.mbn
Port : Auto
Connection : Flash Mode

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM11)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&27a185c8&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 1231383068
Firmware Version : 7
Product Name : RE1BMB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30535680[14,561 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 4
ID : NRD90M
SDK : 24
Release : 7.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : mido-user 7.0 NRD90M V11.0.2.0.NCFMIXM release-keys
Miui Ver : V11
Device : mido
Mod_device : mido_global
Board : msm8953
Display ID : AL1512-mido-build-20191107001817
Security Patch : 2018-12-01
Emmc_size : 16GB
Platform : msm8953
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : xiaomi/mido/mido:7.0/NRD90M/V11.0.2.0.NCFMIXM:user/release-keys

Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items

*** FRP Reset ***
Resetting FRP...
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOkOk

Elapsed Time : 00:00:03
BR
Dipendar Pathak
  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 12-19-2020, 12:00   #764 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi Note 4 MTK 6797 full backed up except user data successful done by Hydra

Xiaomi Redmi Note 4 MTK 6797 full backed up except user data successful done by Hydra Tool




Screen Short:





Logs:


Quote:
Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
Connection
-Please wait...
-Found...
-PreLoader...[COM22]

TPortConnection.Create...(COM22)..Opening...Ok

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1A5AB81A967FE62CEC66956C678E0CEF
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 450100444634303634014321E7BC64F1 - DF4064

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi Note 4
ID : MRA58K
SDK : 23
Release : 6.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : nikel-user 6.0 MRA58K V10.2.1.0.MBFMIXM release-keys
Miui Ver : V10
Device : nikel
Mod_device : nikel_global
Display ID : MRA58K
Security Patch : 2018-08-01
Platform : mt6797
Fingerprint : Xiaomi/nikel/nikel:6.0/MRA58K/V10.2.1.0.MBFMIXM:user/release-keys
StorageType : mtp,mass_storage
Userdata State : Encrypted

-------------------------------------
Operation : Backup All By Partitions Except Userdata
Processing...

Reading Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_lcsh6797_6c_lw_m.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Full\Xiaomi_Redmi Note 4_0279-mt6797-6.0(MRA58K)_191220152459\MT6797_Android_scatter.tx t
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-recovery[0x00008000]16 MB ->recovery.bin...Ok
-para[0x01008000]512 KB ->para.bin...Ok
-expdb[0x01088000]10 MB ->expdb.bin...Ok
-nvcfg[0x01A88000]8 MB ->nvcfg.bin...Ok
-nvdata[0x02288000]32 MB ->nvdata.bin...Ok
-metadata[0x04288000]32 MB ->metadata.bin...Ok
-protect1[0x06288000]8 MB ->protect1.bin...Ok
-protect2[0x06A88000]13.469 MB ->protect2.bin...Ok
-seccfg[0x07800000]8 MB ->seccfg.bin...Ok
-oemkeystore[0x08000000]2 MB ->oemkeystore.bin...Ok
-proinfo[0x08200000]3 MB ->proinfo.bin...Ok
-md1img[0x08500000]24 MB ->md1img.bin...Ok
-md1dsp[0x09D00000]4 MB ->md1dsp.bin...Ok
-md1arm7[0x0A100000]3 MB ->md1arm7.bin...Ok
-md3img[0x0A400000]5 MB ->md3img.bin...Ok
-scp1[0x0A900000]1024 KB ->scp1.bin...Ok
-scp2[0x0AA00000]1024 KB ->scp2.bin...Ok
-nvram[0x0AB00000]5 MB ->nvram.bin...Ok
-lk[0x0B000000]4 MB ->lk.bin...Ok
-lk2[0x0B400000]4 MB ->lk2.bin...Ok
-boot[0x0B800000]16 MB ->boot.bin...Ok
-logo[0x0C800000]8 MB ->logo.bin...Ok
-tee1[0x0D000000]5 MB ->tee1.bin...Ok
-tee2[0x0D500000]5 MB ->tee2.bin...Ok
-keystore[0x0DA00000]8 MB ->keystore.bin...Ok
-cust[0x0E200000]518 MB ->cust.bin...Ok
-system[0x2E800000]3 GB ->system.bin...Ok
-cache[0xEE800000]432 MB ->cache.bin...Ok
-otp[0xE8BCFBE00]43 MB ->otp.bin...Ok
-flashinfo[0xE8E7FBE00]16 MB ->flashinfo.bin...Ok
Reading Done!!!
C:\Hydra Tool\\Backup\Full\Xiaomi_Redmi Note 4_0279-mt6797-6.0(MRA58K)_191220152459 Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:02:49
BR
Dipendra Pathak
  Reply With Quote
Old 12-19-2020, 12:13   #765 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi Note 5A (Ugg) FRP successfully removed by Hydra Tool

Xiaomi Redmi Note 5A (Ugg) FRP successfully removed by Hydra Tool



Screen Short :





Logs:


Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi Note 5A (Ugg) Storage : Auto
Loader: mi_2_2.mbn
Port : Auto
Connection : Flash Mode

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM26)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&2d092be8&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/25/2016,2.1.2.2

Getting device info......
Serial No.: 0x839CAB3D
MSM ID : 0x000560E1, MSM8917-Qualcomm Snapdragon 425
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[mi_2_2.mbn]
SaharaBoot... Ok
Sending ...................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 681181449
Firmware Version : 165
Product Name : HAG4a2
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30777344[14.676 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 5A
ID : N2G47H
SDK : 25
Release : 7.1.2
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : ugglite-user 7.1.2 N2G47H V11.0.3.0.NDFMIXM release-keys
Miui Ver : V11
Device : ugglite
Mod_device : ugglite_global
Board : QC_Reference_Phone
Display ID : N2G47H
Security Patch : 2019-08-01
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : xiaomi/ugglite/ugglite:7.1.2/N2G47H/V11.0.3.0.NDFMIXM:user/release-keys

Reading GPT[3]
Drive [0] 48 Items
Drive [1] 0 Items
Drive [2] 0 Items

*** FRP Reset ***
Resetting FRP...
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOkOk

Elapsed Time : 00:00:03
BR
Dipendra Pathak
  Reply With Quote
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 11:27.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.48383 seconds with 10 queries

SEO by vBSEO